Leaders in cybersecurity - and in any other business - need to keep a bank account filled with the trust and respect of their employees and make sure that account stays in the black, said Chase Cunningham, aka the Doctor of Zero Trust. He discussed his new book on how to be a good leader.
Privacy groups are urging European lawmakers finalizing the global treaty on artificial intelligence to tighten rules surrounding the use of AI by the private sector and states. Lawmakers and other country representatives are set to meet for final negotiations on the treaty on March 11.
The rapid rise of artificial intelligence technologies poses new risks. Enterprises using AI must regularly scan for prompt injection attacks, implement transparency in the supply chain and reinforce built-in software controls to serve their company's security needs, Microsoft said.
A new report from the Office of the National Cyber Director calls for the universal adoption of memory-safe programming languages, but experts warned ISMG the process of overhauling legacy information technology and high-impact code can be daunting, costly and risky.
According to a new survey from ISC2, the nonprofit member organization that promotes cybersecurity education, 82% of cybersecurity professionals say AI will improve their job efficiency by helping them conduct analysis, automate tasks, perform monitoring, predict vulnerabilities and block threats.
In the latest weekly update, ISMG editors discussed the convergence of the NOC and SOC functions, Scottish Police efforts to address the escalating challenge of cybercrime in Scotland, and why OpenAI is pushing to dismiss certain aspects of The New York Times lawsuit.
SaaS Security is often overlooked, as it's a shared security model that many organizations fail to account for. Since organizations are tasked with ensuring their SaaS Platforms are secure from breaches and adversaries, it’s paramount that IT teams understand what they are up against.
Join us for an exclusive...
As cyberthreats grow more sophisticated and pervasive, the need for advanced threat detection, investigation, and response (TDIR) has never been more critical. Staying ahead of potential threats requires a revolutionary approach to TDIR, incorporating cutting-edge AI and automation technologies.
This guide explores...
The 2023 Exabeam State of Threat Detection, Investigation, and Response Report sheds light on five significant hurdles hindering effective TDIR strategies.
Addressing these five challenges are essential for strengthening an organization’s security posture.
This guide explores the top five challenges that stand...
A study by Exabeam and IDC shows cybersecurity spending hit $92 billion in 2022, projected to surpass $170 billion by 2027. Yet, 57% of surveyed organizations still faced significant security incidents in the past year, highlighting the need for advanced threat detection, investigation, and response (TDIR) approaches...
North Korea's Lazarus hackers exploited a Windows AppLocker driver zero-day to gain kernel-level access and turn off security tools that could detect the group's bring-your-own-vulnerable-driver exploitation techniques. Microsoft fixed the bug in its February patch dump.
This week, progress was made in the FTX case, a hacker testified in the Bitcoin Fog case, an Axie Infinity co-founder and a MicroStrategy account were hacked, the KyberSwap hacker moved funds, the EU has a new AMLA office, and Aleo was breached.
The U.S. presidential election is still eight months away, but the FBI is already seeing its share of cyberattacks, nation-state threats and AI-generated deepfakes. According to FBI Agent Robert K. Tripp, "We're no longer considering threats as a what-if situation; it's happening now."
Chinese threat actors are continuing to persist after exploiting the recent Ivanti Connect Secure VPN vulnerability even after factory resets, system upgrades and patches. The threat actor, UNC5325, is adept at "living off the land" techniques, warned threat intelligence firm Mandiant.
Has the U.S. created the wrong war machine? Developing and deploying advanced military technologies involves balancing the desire to improve national security with the need to navigate the ethical, strategic and existential challenges these technologies present.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.